Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Tips & Tricks’ Category

Thycotic Launches Free Privileged Accounts Discovery for Windows

Tuesday, February 2nd, 2016

WASHINGTON, Feb. 2, 2016 /PRNewswire/ — Thycotic, provider of privileged account management solutions for more than 3,500 organizations world-wide, today announced that Privileged Accounts Discovery for Windows is now being offered for free. Designed with security pros, IT management and C-level executives in mind, the tool provides one collection point for all Windows privileged accounts, generates […]

Achieve PII Compliance Through Security Awareness Training

Monday, November 2nd, 2015

Introduction Personally Identifiable Information is defined by the National Institute of Standards and Technology (NIST) as: Information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc., alone, or when combined with other personal or identifying information which is linked or linkable to a […]

New Enterprise Ticketing System Integrations Available for BMC Software and ServiceNow in Secret Server

Monday, October 5th, 2015

The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of updating and closing out tickets based on what privileged users are doing within the solution. That’s why the latest update to Secret Server now […]

PAM Security Blog Series Part 5: Tips for Implementing Privileged Account Management Solutions

Tuesday, September 8th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Don’t take the boil the ocean approach. Implementing a privileged account management strategy is a foundational element […]

Tips for Being A Pragmatic CSO

Tuesday, September 8th, 2015

The cybersecurity landscape is ever-changing, with new threats and technologies appearing every single day. There are more data breaches than ever, more compliance guidelines, and more new technology to secure in the workplace that has the potential to be misused by untrained employees. So why, then, does senior management tend to see security as an […]

How to Use Passwords

Tuesday, May 12th, 2015

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, passwords can add little to no security unless both end users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts […]

How Marketers Can Prepare for a Cyber Security Crisis

Tuesday, March 31st, 2015

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are […]

3 Tips to Stay Safe Shopping this Holiday Season

Tuesday, December 16th, 2014

The holidays are here, and so are many tempting sales from the nation’s largest retailers. Despite the recent trend of data breaches we have seen among consumer companies like Target and Home Depot, we doubt that will slow down 2014’s holiday shoppers. No matter where you shop, use these three tips to stay safe. Use […]

Haunting Tale: Beware of the Insider

Tuesday, October 28th, 2014

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month supported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month […]

Secret Server: The Getting Started Guide for End-Users

Tuesday, August 12th, 2014

In our recent blog post, Don’t let your company’s social media get hacked: Deploy Secret Server to end-users, you learned about our new Basic User Dashboard and how to administer Secret Server to your end users. We wanted to make getting started with Secret Server simple and straightforward for your end users. Share this blog […]

Try Secret Server FREE for 30 Days!